Peer-to-Peer Networking
(同儕網路) 2013
Lecturer:江振瑞 (jrjiang_a_t_csie.ncu.edu.tw)
Teacher Assistant: 黃捷群 黃郁誠
Time: Thursday 09:20~12:00
Place: E6-A203
BlackBoard System: http://bb.ncu.edu.tw
(同儕網路)
Course Description:
This course provides an in-depth examination of advanced topics in
peer-to-peer (P2P) networking in which all the peers play symmetric
roles (such as both clients and servers). The course has two parts. The
first
part covers traditional P2P-related
topics such as P2P data sharing, P2P resource search, P2P storage, P2P
multicast,
P2P security, P2P reputation and incentive. P2P networked virtual
environments (P2P
NVEs), P2P massively multiplayer online games (MMOGs), etc. The second
part covers the topics of integrating P2P technologies into mobile ad
hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad
hoc networks (VANETs),
4G
LTE (Long Term Evolution) self-organizing networks (SONs), etc.
After finishing the course, the students
can become familiar with basic concepts of P2P networking, and their
integration with MANETs, WSNs, VANETs, and SONs.
Syllabus:
- (3/7) Core Concepts in P2P Computing (P2P.ppt)
- (3/14) P2P Content Sharing - Napster and Gnutella: How to improve
Gnutella (Gnutella.zip)
- (3/14) P2P Content Sharing - Introduction to BitTorent (BT.zip)
(3/14) Reference: Ted Herman and
Colette Johnen, "Strategies for peer-to-peer downloading," Information
Processing Letters, Volume 94, Issue 5, Pages 203-209, 2005. (Abstract:
An advantage of peer-to-peer applications is that files can be shared
without concentrated load on file servers. This note proposes
deterministic techniques for splitting a files into segments so that,
for certain restricted cases of arrival and server rates, users may
copy files from one another without fetching the data from file
servers.)
- (3/21 and 3/28) Oral Reports:
- [1] Can Degree Correlation Help to Design Resilient Superpeer
Networks?
Srivastava, Animesh ; Ganguly, Niloy ; Peruani, Fernando ; Mitra, Bivas
Self-Adaptive and Self-Organizing Systems (SASO), 2012 IEEE Sixth
International Conference on
Digital Object Identifier: 10.1109/SASO.2012.19
Publication Year: 2012 , Page(s): 159-168
- [2] The improvement of caching strategies about unstructured
P2P system
Jiang, Xueying ; Gao, Pengfei ; Chen, Wenhui
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd
International Conference on
Digital Object Identifier: 10.1109/CECNet.2012.6201596
Publication Year: 2012 , Page(s): 2168-2171
- [3] Search Algorithm Based on Peers Division in Unstructured
P2P Network
Jianchun, Li ; Tianwu, Zhang ; Fayi, Wang ; Jianyong, Li ; Daoying,
Huang
Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth
International Conference on
Digital Object Identifier: 10.1109/ICICTA.2012.124
Publication Year: 2012 , Page(s): 471-473
- [4] Enabling Re-encryption of Hierarchical Verifiable
Permutation Scheme for Bittorrent Chunk Exchanges
Wang, Jian ; Xu, Xiaolin ; Wu, Xiumei ; Yang, Yinchun
Computer Science & Service System (CSSS), 2012 International
Conference on
Digital Object Identifier: 10.1109/CSSS.2012.235
Publication Year: 2012 , Page(s): 926-929
- [5] A Peer-to-Peer Architecture for Supporting Dynamic Shared
Libraries in Large-Scale Systems
Dosanjh, Matthew G F ; Bridges, Patrick G. ; Kelly, Suzanne M. ; Laros,
J.H.
Parallel Processing Workshops (ICPPW), 2012 41st International
Conference on
Digital Object Identifier: 10.1109/ICPPW.2012.11
Publication Year: 2012 , Page(s): 55-61
- [6] Accelerating peer-to-peer file sharing with social
relations: Potentials and challenges
Wang, Haiyang ; Wang, Feng ; Liu, Jiangchuan
INFOCOM, 2012 Proceedings IEEE
Digital Object Identifier: 10.1109/INFCOM.2012.6195722
Publication Year: 2012 , Page(s): 2891-2895
- (4/11) Distributed Hash Tables (DHTs) (Chord, CAN, Pastry, etc)
(Structured-P2P-Networks.zip)
- Supplimetary Material for DHTS: (Power-Law
and Small World Networks.zip); P2P Storage Systems (MUREX.ppt)(P2PStorageSystems.ppt)(NFS-AFS.ppt); One-Hop DHTs (OneHopDHTs.zip)
- (4/18) Take-home Midterm Report:
Choose one of following DHT methods, except Chord, Pastry, and CAN, to
write the midterm report, which should contain more than 5 pages to
include references and descriptions and/or examples of the routing,
join, put, and get operations of the method. You can write the report
in either Chinese or English, and hand it in on 4/25.
- DHTs based on trees
- DHTs based on rings
- DHTs based on tori
- DHTs based on butterflies
- DHTs based on DeBruijn graphs
- DHTs based on skip lists (skip graphs)
- DHTs based on Hypercubes
- (4/25) VANETs (Vehicular Ad hoc Networks)(V2V,
V2I)(VANET.pptx)
- (5/2)(5/9) Papers for oral reports
- 2012_(IEEECnfWCNC)A robust congestion control
scheme for fast and
reliable dissemination of safety messages in VANETs
- 2012_(IEEECnfICCCN)On the Impact of
Multi-Channel Technology on
Safety-Message Delivery in IEEE 802.11p-1609.4 Vehicular Networks
- 2012_(IEEECnfCSNDSP)Performance evaluation of
IEEE 802.11p for
vehicular communication networks
- 2013_(IEEEJnlTVT)Collision Control of Periodic
Safety Messages
With Strict Messaging Frequency Requirements
- 2013_(IEEEJnlTITS)VIP-WAVE - On the Feasibility
of IP
Communications in 802.11p Vehicular Networks
- 2012_(IETJnlNet)Performance comparison of media
access control
protocols for vehicular ad hoc networks
- 2011_(IEEECnfANTS)A robust M2M Gateway for effective
integration of capillary and 3GPP networks
- 2012_(IEEECnfWCNCW)Performance evaluation of radio access
network overloading from machine type communications in LTE-A networks
- 2012_(IEEECnfVTC)Coverage and Capacity Analysis for Machine
Type Communications in LTE
- 2011_(IEEECnfITST)Efficient data transmission scheme for
MTC communications in LTE system
- 2012_(IEEECnfICT)QoS-based resource allocation scheme for
Device-to-Device (D2D) radio underlaying cellular networks
- 2012_(IEEECnfPIMRC)Downlink resource allocation for
Device-to-Device communication underlaying cellular networks
- 2012_(IEEECnfGCW)Handling randomness of multi-class Random
Access loads in LTE-Advanced network supporting small data applications
- 2012_(IEEECnfLCNW)Remote subscription management of M2M
terminals in 4G cellular wireless networks
- 2013_(IEEECnfComManTel)Resource allocation scheme for
device-to-device communications underlaying cellular networks
- (6/20) Final Report: Listen to the talk:
"Three-Dimensional Broadcasting with Optimized Transmission Efficiency
in Dense Wireless Networks," and then write a report on site. (ppt)(paper)
The report should include (1) the title of the paper addressed (2) the
problem(s)
or the goal(s), (3) the solution(s)
or improvement(s), (4) how good is the solution(s) or improvement(s),
and (5) conclusion.
Scoring:
- Supplemental reading oral report and in-class participation: 60%
- Midterm Report: 20%
- Final Report: 25%
Reference Books:
- David Boswarthick, Omar Elloumi, and Oliver Hersent, M2M
Communications - A Systems Approach, 2012.
- Sean Percival, Second Life – In-world Travel Guide, Que
Publishing, 2008.
- Alfred Wai-Sing Loo, Peer-to-Peer Computing, Springer, 2007.
- Jie Wu, Handbook on Theoretical and Algorithmic Aspects of
Sensors, Ad Hoc Wireless, and Peer-to-Peer Networks, Auerbach
Publications, 2006.
- Steffen Staab and Heiner Stuckenschmidt, Semantic Web and
Peer-to-Peer, Springer, 2006.
- Ian J. Taylor, From P2P to Web Services and Grids, Springer,
2005.
- Ramesh Subramanian and Brian D. Goodman, Peer-to-Peer Computing:
The Evolution of a Disruptive Technology, IDEA Group Publishing, 2005.
- Sandeep Singhal and Michael Zyda, Networked Virtual
Environments: Design and Implementation, Addison-Wesley Professional,
1999.
- Grenville Armitage, Mark Claypool and Philip Branch, Networking
and Online Games: Understanding and Engineering Multiplayer Internet
Games, Wiley, 2006.
- Jouni Smed and Harri Hakonen, Algorithms and Networking for
Computer Games, John Wiley & Sons, 2006.
- Thor Alexander, Massively Multiplayer Game Development 2 (Game
Development), Charles River Media, 2005.
- Hassan M. Fattah, P2P -- How Peer-to-Peer Technology Is
Revolutionizing the Way We Do Business, Dearborn, 2002.
- Stephan Diehl, Distributed Virtual Worlds, Springer, 2001.